Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-20128
PUBLISHED
More InfoOfficial Page
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
View Known Exploited Vulnerability (KEV) details
Published At-22 Jan, 2025 | 16:21
Updated At-18 Feb, 2025 | 19:40
Rejected At-
▼CVE Numbering Authority (CNA)
ClamAV OLE2 File Format Decryption Denial of Service Vulnerability

A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco Secure Endpoint
Default Status
unknown
Versions
Affected
  • 7.0.5
  • 6.2.19
  • 7.3.3
  • 7.2.13
  • 6.1.5
  • 6.3.1
  • 6.2.5
  • 7.3.5
  • 6.2.1
  • 7.2.7
  • 7.1.1
  • 6.3.5
  • 6.2.9
  • 7.3.1
  • 6.1.7
  • 7.2.11
  • 7.2.3
  • 7.1.5
  • 6.3.3
  • 7.3.9
  • 6.2.3
  • 6.1.9
  • 7.2.5
  • 6.3.7
  • 1.12.3
  • 1.8.0
  • 1.11.1
  • 1.12.4
  • 1.10.0
  • 1.12.0
  • 1.8.1
  • 1.10.1
  • 1.12.1
  • 1.12.6
  • 1.14.0
  • 1.10.2
  • 1.12.2
  • 1.6.0
  • 1.11.0
  • 1.7.0
  • 1.13.0
  • 1.12.7
  • 1.8.4
  • 1.13.1
  • 1.9.0
  • 1.9.1
  • 1.12.5
  • 1.13.2
  • 8.1.7.21512
  • 8.1.7
  • 8.1.5
  • 8.1.3.21242
  • 8.1.3
  • 8.1.5.21322
  • 8.1.7.21417
Problem Types
TypeCWE IDDescription
cweCWE-122Heap-based Buffer Overflow
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory. The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
N/A
https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found